Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain processing method, device and equipment and storage medium

A processing method and blockchain technology, applied in the field of information security, can solve the problems of a single cryptographic algorithm, loss of user data/assets, and the inability of algorithms to be used at the same time, achieving the effect of easy upgrade, improved security and scalability

Active Publication Date: 2019-07-05
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing blockchain network only supports a single cryptographic algorithm, and algorithms with mutually exclusive relationships cannot be used on the same blockchain network at the same time
When a certain signature algorithm / hash algorithm / encryption algorithm has a security hole, it cannot be directly upgraded and a hard fork is required
The cost of hard fork is very high, the old and new networks are not compatible, and users' data / assets will suffer huge losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain processing method, device and equipment and storage medium
  • Block chain processing method, device and equipment and storage medium
  • Block chain processing method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] figure 1 It is a flowchart of a block chain processing method provided by Embodiment 1 of the present invention. This embodiment is applicable to how to process block chains, especially for blocks that can support multiple mutually exclusive cryptographic algorithms In the chain network, how to process the block chain to solve the problem that the existing block chain network only supports a single cryptographic algorithm, and when there is a security hole in the cryptographic algorithm, it cannot be directly upgraded, and a hard fork is required. The whole set of block chain processing methods can be executed by cooperation between user nodes and block chain nodes, wherein the user nodes can be locally deployed devices with block chain clients used by users, such as user terminals. Optionally, the user node can be a node in the blockchain network, or not a node in the blockchain network, but can interact with the blockchain node through the interface provided by the bl...

Embodiment 2

[0066] figure 2 It is a flow chart of a block chain processing method provided by Embodiment 2 of the present invention. This embodiment is further optimized on the basis of the above embodiments, and provides a scenario where a security vulnerability occurs in the cryptographic algorithm of the target user. For the scheme of how to carry out blockchain processing, see figure 2 , the method may specifically include:

[0067] S210. Determine a target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein the at least two candidate cryptographic algorithms are deployed in blockchain nodes.

[0068] S220. Create a blockchain account of the target user according to the target cryptographic algorithm, and add a marker of the target cryptographic algorithm to the blockchain account information as an algorithm marking part.

[0069] Among them, the algorithm marking part is used to determine...

Embodiment 3

[0085] image 3 It is a flow chart of a block chain processing method provided by Embodiment 3 of the present invention. This embodiment is based on the above embodiments, and further explained by creating a target user's block chain account according to the target cryptographic algorithm. see image 3 , the method may specifically include:

[0086] S310. Determine a target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein the at least two candidate cryptographic algorithms are deployed in blockchain nodes.

[0087] S320, according to the obtained random number and the target elliptic curve in the target cryptographic algorithm, determine the value part of the block chain key of the target user.

[0088] In this embodiment, the value part in the blockchain key is the specific content of the blockchain key, which is used for signing / encrypting data, transaction requests, etc.; optio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a block chain processing method and device, equipment and a storage medium. The method is executed by a user node and comprises: determining a target cryptographic algorithm used by a target user from at least two candidate cryptographic algorithms provided by a block chain network, wherein the at least two candidate cryptographic algorithms are deployed in the block chain node; and according to the target cryptographic algorithm, creating a block chain account of a target user, and adding a marker of the target cryptographic algorithm to the block chain account information to serve as an algorithm marking part, the algorithm marking part being used for determining a corresponding cryptographic algorithm in the process of verifying the account information by the block chain node. According to the technical scheme provided by the embodiment of the invention, the same block chain network can support a plurality of mutually exclusive cryptographicalgorithms, so that the security and the expandability are greatly improved, upgrading is very easy, and hard forking is not needed.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular to a block chain processing method, device, equipment and storage medium. Background technique [0002] The existing blockchain network only supports a single cryptographic algorithm, and algorithms with mutually exclusive relationships cannot be used on the same blockchain network at the same time. When a certain signature algorithm / hashing algorithm / encryption algorithm has a security hole, it cannot be directly upgraded, and a hard fork is required. The cost of hard forks is very high, the old and new networks are incompatible, and users' data / assets will suffer huge losses. Contents of the invention [0003] Embodiments of the present invention provide a block chain processing method, device, equipment, and storage medium. The same block chain network can support multiple mutually exclusive cryptographic algorithms, which greatly imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3236H04L9/50
Inventor 荆博
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD